General

  • Target

    b9e5b771c3cb78dccfa550756a39ba14_JaffaCakes118

  • Size

    603KB

  • Sample

    240823-b798lsygrb

  • MD5

    b9e5b771c3cb78dccfa550756a39ba14

  • SHA1

    5ad070a71fe192a9c5ada14d016fc70f017be383

  • SHA256

    309b29e947d1fc1e5b8e5f3b7d1f734f61e4ecd4fd6287a7f25a261c553fe244

  • SHA512

    141fdcec3d6b7d7643489f60f62bb64b377e389276d38e0de4adb9d0119ad83cab260c92b7155246e25fd59891043f88a2ae1a2f3783229ccbfb4bb2dc7594e7

  • SSDEEP

    12288:sbqsikWffJFopGwZ/8Zadq61u+EaLvCIU++r66PG7zZIYrI8cLj0URN1WQ2t:qqsTmf8p/6adq6MOvd+OzZzM8k1P1x

Malware Config

Targets

    • Target

      b9e5b771c3cb78dccfa550756a39ba14_JaffaCakes118

    • Size

      603KB

    • MD5

      b9e5b771c3cb78dccfa550756a39ba14

    • SHA1

      5ad070a71fe192a9c5ada14d016fc70f017be383

    • SHA256

      309b29e947d1fc1e5b8e5f3b7d1f734f61e4ecd4fd6287a7f25a261c553fe244

    • SHA512

      141fdcec3d6b7d7643489f60f62bb64b377e389276d38e0de4adb9d0119ad83cab260c92b7155246e25fd59891043f88a2ae1a2f3783229ccbfb4bb2dc7594e7

    • SSDEEP

      12288:sbqsikWffJFopGwZ/8Zadq61u+EaLvCIU++r66PG7zZIYrI8cLj0URN1WQ2t:qqsTmf8p/6adq6MOvd+OzZzM8k1P1x

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks